Current Description

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.

Basic Data

PublishedMay 16, 2002
Last ModifiedSeptember 11, 2008
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSasSas Base8.0*******
    2.3ApplicationSasSas Base8.1*******
    2.3ApplicationSasSas Integration Technologies8.0*******
    2.3ApplicationSasSas Integration Technologies8.1*******

Vulnerable Software List

Sas Sas Base 8.0, 8.1
Sas Sas Integration Technologies 8.0, 8.1


20020129 sastcpd Buffer Overflow and Format String Vulnerabilities Advisory
20020129 Re: [VulnWatch] sastcpd Buffer Overflow and Format String Vulnerabilities
20020129 sastcpd Buffer Overflow and Format String Vulnerabilities Advisory
sas-sastcpd-spawner-bo(8017) Vendor Advisory